Logo
Unit42 Logo
  • Tools
  • ATOMs
  • Security Consulting
  • About Us
  • Under Attack?

Posts created by: Ken Hsu

CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) (Updated)A conceptual image representing a vulnerability, such as CVE-2022-22965, aka SpringShell, discussed here.
99,577
people reacted

CVE-2022-22965: Spring Core Remote Code Execution Vulnerability Exploited In the Wild (SpringShell) (Updated)

  • By Haozhe Zhang, Ken Hsu, Tao Yan, Qi Deng and Robert Falcone
  • March 31, 2022 at 4:30 PM

87

12 min. read

Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations
33,139
people reacted

Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations

  • By Ken Hsu, Vaibhav Singhal and Zhibin Zhang
  • April 8, 2021 at 12:29 PM

15

5 min. read

Trending

  • Machine Learning Versus Memory Resident Evil by Esmid Idrizovic
Network Attack Trends: Internet of Threats (August-October 2020)The conceptual image represents internet attack trends such as those discussed here, including scanner activities and HTTP directory traversal exploitation attempts.
33,513
people reacted

Network Attack Trends: Internet of Threats (August-October 2020)

  • By Yue Guan, Lei Xu, Ken Hsu and Zhibin Zhang
  • January 22, 2021 at 6:00 AM

27

8 min. read

Two New IoT Vulnerabilities Identified with Mirai PayloadsThis conceptual image illustrates the idea of cybercrime.
35,189
people reacted

Two New IoT Vulnerabilities Identified with Mirai Payloads

  • By Ken Hsu, Yue Guan, Vaibhav Singhal and Qi Deng
  • October 14, 2020 at 12:00 PM

19

5 min. read

Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices
82,024
people reacted

Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices

  • By Ken Hsu, Durgesh Sangvikar, Zhibin Zhang and Chris Navarrete
  • June 24, 2020 at 6:00 AM

35

13 min. read

Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet
39,423
people reacted

Grandstream and DrayTek Devices Exploited to Power New Hoaxcalls DDoS Botnet

  • By Ken Hsu, Haozhe Zhang, Zhibin Zhang and Ruchna Nigam
  • April 3, 2020 at 1:07 PM

22

7 min. read

New Mirai Variant Targets Zyxel Network-Attached Storage Devices
38,198
people reacted

New Mirai Variant Targets Zyxel Network-Attached Storage Devices

  • By Ken Hsu, Zhibin Zhang and Ruchna Nigam
  • March 19, 2020 at 12:15 PM

27

7 min. read

Attackers Increasingly Targeting Oracle WebLogic Server Vulnerability for XMRig and Ransomware
46,328
people reacted

Attackers Increasingly Targeting Oracle WebLogic Server Vulnerability for XMRig and Ransomware

  • By Ken Hsu, Matthew Tennis, Yanhui Jia, Zhibin Zhang and Durgesh Sangvikar
  • May 3, 2019 at 4:14 PM

16

6 min. read

Popular Resources

  • Resource Center
  • Blog
  • Communities
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Terms of Use
  • Documents

Account

  • Manage Subscriptions
  •  
  • Report a Vulnerability

© 2023 Palo Alto Networks, Inc. All rights reserved.